All Articles (2242)

Sort by

11004874671?profile=RESIZE_400xAccording to various investigating agencies, thousands are believed to have lost their savings after investing in a cryptocurrency trading app called iEarn Bot   https://www.iearnbot.com.  DO NOT VISIT THIS WEBSITE; IT IS A SCAM.  Experts investigating the company say it could be one of the largest crypto scandals.  Cryptocurrency trading has become popular, with people often promising large rewards over short periods.  But law enforcement agencies warn of many scams and recommend investors cond

11004871290?profile=RESIZE_400xThe malware downloader BATLOADER has been observed abusing Google ADs to deliver secondary payloads like Vidar Stealer and Ursnif.  According to cybersecurity researchers, malicious ads are used to spoof a wide range of legitimate apps and services, such as Adobe, OpenAPI's ChatGPT, Spotify, Tableau, and Zoom.  BATLOADER, as the name suggests, is a loader responsible for distributing next-stage malware such as information stealers, banking malware, Cobalt Strike, and even ransomware.

See:  https

11002441075?profile=RESIZE_400xPhishing, the theft of users' credentials or sensitive data using social engineering, has been a significant threat since the early days of the internet and continues to plague organizations, accounting for more than 30% of all known breaches. With the ongoing trend to remote working during and post pandemic, hackers have increased their efforts to steal login credentials as they take advantage of the chaos and lack of in-person user verification.

This has led to the revival of the old-school te

11004182894?profile=RESIZE_400xAs part of the Enduring Security Framework (ESF), the Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) have released Identity and Access Management Recommended Best Practices Guide for Administrators.  These best practices provide system administrators with actionable recommendations to better secure their systems from Identity and Access Management (IAM) threats.

IAM, a framework of business processes, policies, and technologies that facilitate the

11002734488?profile=RESIZE_400xOne of the US’ largest food distributors has left chefs, owners and restaurant staff across the nation scratching their heads and looking for answers after a disruption to service that began last week.  Fort Worth TX based Ben E. Keith issued a public statement last week regarding issues with their systems that left trucks unable to make deliveries to restaurants for days.[1]  The full statement reads: "Ben E. Keith recently detected unusual activity in our network.  In response, we proactively

11001051456?profile=RESIZE_400xItalian sports car maker Ferrari reported on 19 March that a threat actor had demanded a ransom related to customer contact details that may have been exposed in a ransomware attack.  “Upon receipt of the ransom demand, we immediately started an investigation in collaboration with a leading global third-party cybersecurity firm,” the iconic car maker said.  “In addition, we informed the relevant authorities and are confident they will investigate to the full extent of the law.”

The company did n

11001436283?profile=RESIZE_400xAs the Captain of your ship, you are standing on the bridge and the course is being monitored on a digital display. The course shows a heading of north, yet the ship continues to turn west. On the computer screens in the dark wheelhouse, everything looks normal, but outside your window, the land is coming dangerously close! What is happening? You do not want to run aground, or worse collide with the pier or other vessels.

Down in the engine room, the engineers report back to you via radio that e

11001490474?profile=RESIZE_400xMeta’s workforce ballooned in recent years as the Facebook parent company signaled its ambitions for the metaverse. Still, recent moves suggest that it is feeling the sting of changing tech trends and rough market conditions.  The company today announced another round of layoffs, one day after saying that it was “winding down” support for NFTs (non-fungible tokens).  Co-founder and CEO Mark Zuckerberg wrote in a post on 14 March 2023 that Meta will terminate about 10,000 additional employees in

11001080665?profile=RESIZE_400xGoogle has launched Bard, yes Bard, the search giant’s answer to OpenAI’s ChatGPT and Microsoft’s Bing Chat.  Unlike Bing Chat, Bard does not look up search results, all the information it returns is generated by the model itself.  But it is still designed to help users brainstorm and answer queries.  Google wants Bard to become an integral part of the Google Search experience.

In a recent live demo, Google demonstrated that Bard came up with ideas for a child’s bunny-themed birthday party and g

11001479897?profile=RESIZE_400xRecently, cyber threat actors have been observed using AI-generated YouTube Videos to spread various stealer malware such as Raccoon, RedLine, and Vidar.   The videos lure users by pretending to be tutorials on downloading cracked software versions such as Photoshop, Premiere Pro, Autodesk 3ds Max, AutoCAD, and other licensed products available only to paid users.  Nothing is free on the Internet; you may be paying with a malware infection.

See:  https://redskyalliance.org/xindustry/raccoon-pass

11000905285?profile=RESIZE_400xCybercriminals have started taking advantage of Silicon Valley Bank’s (SVB) downfall to carrying out scams that can steal money and bank account information or infect customers’ systems with malware.  SVB was shut down on 10 March 2023 by the California Department of Financial Protection and Innovation and the Feds after the bank failed to raise capital to keep running.[1]

See:  https://redskyalliance.org/xindustry/svb-bank-run-not-good

SVB customers are expected to transfer their financial oper

11000532066?profile=RESIZE_400xMalware has a way of grabbing all the attention in the media and keeping companies on their toes.  The world watched as wipers were deployed to Ukrainian organizations after the Russian invasion of Ukraine, which marked the beginning of a time of instability that included ransomware and InfoStealers, as well.  Adding to the negative cybersecurity load of 2022, the contemporary version of ransomware celebrated its 10-year anniversary.

And if that were not enough, researchers have seen that a cybe

10999187252?profile=RESIZE_400xKill Chain - In today’s wildly unpredictable threat landscape, the modern enterprise should be familiar with the cyber kill chain concept.  A cyber kill chain describes the various stages of a cyberattack pertaining to network security.  Lockheed Martin developed the original cyber kill chain framework to help organizations identify and prevent cyber intrusions.   The steps in a kill chain trace the typical stages of an attack from early reconnaissance to completion.  Analysts use the framework

10998110089?profile=RESIZE_400xAn open source Adversary-in-The-Middle (AiTM) phishing kit has found new users in the cybercrime world for its ability to make cyberattacks at scale.  Microsoft Threat Intelligence is tracking the threat actor behind the development of the kit under its emerging name DEV-1101.  An AiTM phishing attack typically involves a threat actor attempting to steal and intercept a target's password and session cookies by deploying a proxy server between the user and the website.

Such attacks are more effec

10999205498?profile=RESIZE_400xRed Sky Alliance monthly queries our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails.  Malicious actors use emails with Motor Vessel (MV) or Motor Tanker (MT) in the subject line as a lure to entice users in the maritime industry to open emails containing malicious attachments.  Red Sky Alliance is providing this list of Motor Vessels in which we directly observed the vessel being impersonated, with associated

10998658499?profile=RESIZE_400xThe latest edition of the CrowdStrike Global Threat Report[1] comes at an important time for protectors around the world.  As organizations focus on managing remote and hybrid teams, operationalizing years of digital transformation and navigating an uncertain global economy, adversaries have become more sophisticated, relentless and damaging in their attacks.  As a result, a number of disruptive trends emerged in 2022 that threaten productivity and global stability.

The year started ominously as

10998572882?profile=RESIZE_400xFortinet warns that a recently addressed FortiOS vulnerability has been exploited by a sophisticated threat actor in highly targeted attacks against governmental and government-related entities.  Patched last week, the bug is tracked as CVE-2022-41328 and is described as a medium-severity path traversal issue leading to command execution.  When it announced the availability of fixes, Fortinet failed to mention that this was actually a zero-day vulnerability.[1]  “An improper limitation of a path

10998526880?profile=RESIZE_400xOur US government just loves acronyms.  Well, here’s a brand new one - RVWP.  The Department of Homeland Security (DHS), Cybersecurity infrastructure Security Agency (CISA) is telling organizations across all sectors and of all sizes they are often impacted by damaging ransomware incidents.  Many of these incidents are perpetrated by ransomware threat actors using known vulnerabilities.  By urgently fixing these vulnerabilities, organizations can significantly reduce their likelihood of experien

10997443262?profile=RESIZE_400xAnother day and another US Securities and Exchange Commission (SEC) crypto crackdown case.  Recently, the US regulator announced emergency action against investment adviser BKCoin Management in connection with an alleged fraud scheme.  

The SEC alleged on 07 March 2023 that Miami-based BKCoin Management raised $100 million from at least 55 investors to plug into cryptocurrency. Instead, it was used to spend on luxury items and make “Ponzi-like payments” to investors to hide their fraud.  The inv

10997071889?profile=RESIZE_400xSome CISOs and security professionals respond to threats with the same phrase, “I don’t care who is attacking me, I just want it to stop.”  They deploy an array of security tools to better block attacks, and they hope the malicious actors will go elsewhere. Does this work?  Some mature security teams have mature detection and intelligence programs that place a serialized code on the bottom of their SOC and intelligence reports that ultimately accumulate to a dollar loss prevention number.  But v